Backdoor discovered in D-Link routers
15 October, 2013 by Andrew CollinsSeveral D-Link router models contain a vulnerability that would give an interloper complete administrative access over the devices, according to one vulnerability researcher.
Unified threat management explained
15 October, 2013 by Pat DevlinUnified threat management (UTM) systems combine a firewall with other security features, centralising visibility, reporting and security controls in a single device to simplify management of network security.
Taking the IT out of security
10 October, 2013 by Angela Coble*The greatest gain we have seen in IT, and security more specifically, has been without a "product" or "technology" but with simple messages and human interaction, argues Angela Coble.
Cisco completes Sourcefire purchase
09 October, 2013 by Dylan Bushell-EmblingCisco has completed the $2.7b acquisition of Sourcefire, to further its goal of developing a threat-centric approach to security.
Huawei blasts US for "illegal action"
17 September, 2013 by Andrew CollinsChinese networking vendor Huawei has accused the United States of taking "illegal action", after the release of a report claiming the NSA targeted the vendor for surveillance.
Five steps to prepare for the next security threat cycle
05 September, 2013 by Chris Wood*About every five years, attackers launch new types of threats - and a new wave is upon us. These steps can help to avoid being compromised by this new wave.
Microsoft and Google to sue US government
03 September, 2013 by Andrew CollinsMicrosoft and Google will move ahead with litigation against the US government, in order to gain permission to disclose greater detail about the customer information they are compelled to reveal to US agencies under the US's Foreign Intelligence Surveillance Act (FISA).
Security - the antithesis of innovation?
29 August, 2013 by Dr Hugh Thompson*It's commonly said in IT that security is the antithesis of innovation. Innovation creates disruption, and disruption introduces vulnerability. But is that really the case?
APAC DDoS protection market booming
21 August, 2013 by Dylan Bushell-EmblingDemand for DDoS protection technology is booming in APAC, but doubts about the value of such solutions still linger in Australia and other markets.
NZ spy law could rock nation’s ICT sector
08 August, 2013 by Dylan Bushell-EmblingICT groups opposed to NZ’s proposed new interception amendments fear the rules could reduce the competitiveness of domestic companies and force international players out of the market.
UPDATED: Aussie defence agencies ban Lenovo due to backdoor fears
30 July, 2013Computers from Chinese company Lenovo have been banned from “classified” networks of the intelligence and defence services of Australia, the United States, Britain, Canada and New Zealand due to concerns that the machines could easily be hacked.
Australian government caught blocking websites on the sly
21 May, 2013The federal government has been caught quietly blocking access to websites, leading some to declare that it has attempted to sneak mandatory web filtering in on the sly.
DDoS protection keeps Betstar.com.au running
29 April, 2013Online betting website Betstar.com.au was recently taken down, when a DDoS (distributed denial of service) attack aimed at a competitor in the same co-location data centre took Betstar’s site with it. Betstar decide it was time to implement DDoS protection.
Cybersecurity challenges in 2013
08 March, 2013 by Sandeep Joshi, Country Manager for DELL SonicWALL Inc, Australia and New ZealandThe issues affecting businesses are similar around the world. The key issues and points of vulnerability are around human engagement.
Kaspersky Endpoint Security for Business
27 February, 2013Kaspersky Endpoint Security for Business (KESB) is intended to help businesses overcome challenges in managing a secure network.